-
Bug
-
Resolution: Duplicate
-
P2
-
24
-
x86_64
-
windows
Test: java/text/Format/DateFormat/Bug8141243.java
case 1:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007ff90c60a990, pid=34608, tid=22848
#
# JRE version: Java(TM) SE Runtime Environment (24.0+27) (build 24-ea+27-3417)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (24-ea+27-3417, mixed mode, tiered, compressed oops, compressed class ptrs, g1 gc, windows-amd64)
# Problematic frame:
# V [jvm.dll+0x6da990] Method::is_method_handle_intrinsic+0x0
#
# Core dump will be written. Default location: C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\scratch\5\hs_err_pid34608.mdmp
#
# If you would like to submit a bug report, please visit:
# https://bugreport.java.com/bugreport/crash.jsp
#
--------------- S U M M A R Y ------------
Command Line: -Xmx768m -XX:MaxRAMPercentage=4.16667 -Dtest.boot.jdk=c:\ade\mesos\work_dir\jib-master\install\jdk\23\37\bundles\windows-x64\jdk-23_windows-x64_bin.zip\jdk-23 -Djava.io.tmpdir=c:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\tmp -XX:+CreateCoredumpOnCrash -ea -esa -Djava.library.path=c:\ade\mesos\work_dir\jib-master\install\jdk-24+27-3417\windows-x64.test\jdk\jtreg\native --patch-module=java.base=C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\patches\java.base -Djava.security.policy=file:/c:/sb/prod/1733167089/testoutput/test-support/jtreg_open_test_jdk_tier2_part2/jtreg.policy com.sun.javatest.regtest.agent.AgentServer -id 24 -logfile C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\jtData\agentServer.24.trace -allowSetSecurityManager -port 64468 -timeoutFactor 4.0
Host: AMD EPYC 7J13 64-Core Processor , 12 cores, 23G, Windows Server 2022 , 64 bit Build 20348 (10.0.20348.2760)
Time: Mon Dec 2 19:29:16 2024 Etc elapsed time: 146.106918 seconds (0d 0h 2m 26s)
--------------- T H R E A D ---------------
Current thread (0x000002b47b14ff10): JavaThread "C1 CompilerThread0" daemon [_thread_in_vm, id=22848, stack(0x000000c5ac500000,0x000000c5ac600000) (1024K)]
Current CompileTask:
C1:146107 6853 3 java.lang.CharacterData00::toLowerCase (3463 bytes)
Stack: [0x000000c5ac500000,0x000000c5ac600000], sp=0x000000c5ac5fe358, free space=1016k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V [jvm.dll+0x6da990] Method::is_method_handle_intrinsic+0x0 (method.cpp:1394)
siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff
Registers:
RAX=0x0000000000000000, RBX=0x000002b41361b500, RCX=0x636f6c5f61746144, RDX=0x000002b400b98b08
RSP=0x000000c5ac5fe358, RBP=0x0000000000000000, RSI=0x000002b41361b500, RDI=0x0000000000000002
R8 =0x0000000000000000, R9 =0x0000000000000002, R10=0x000002b46d7fa9b0, R11=0x000000c5ac5fe410
R12=0x000002b47b151fb0, R13=0x0000000000000000, R14=0x000000c5ac5fe410, R15=0x0000000000003af0
RIP=0x00007ff90c60a990, EFLAGS=0x0000000000010206
XMM[0]=0x0000000000000000 0x0000000000000000
XMM[1]=0x0000000000000000 0x00000000ffffffff
XMM[2]=0x310c480dff327c01 0x300e380578013105
XMM[3]=0x601b601b601b601b 0x601b601b601b601b
XMM[4]=0x601b601b601b601b 0x601b601b601b601b
XMM[5]=0x0000000000000000 0x000000200000371b
XMM[6]=0x0000000000000000 0x0000000000000000
XMM[7]=0x0000000000000000 0x0000000000000000
XMM[8]=0x0000000000000000 0x0000000000000000
XMM[9]=0x0000000000000000 0x0000000000000000
XMM[10]=0x0000000000000000 0x0000000000000000
XMM[11]=0x0000000000000000 0x0000000000000000
XMM[12]=0x0000000000000000 0x0000000000000000
XMM[13]=0x0000000000000000 0x0000000000000000
XMM[14]=0x0000000000000000 0x0000000000000000
XMM[15]=0x0000000000000000 0x0000000000000000
MXCSR=0x00001fa0
Register to memory mapping:
RAX=0x0 is null
RBX=0x000002b41361b500 points into unknown readable memory: 0x0000000000000000 | 00 00 00 00 00 00 00 00
RCX=0x636f6c5f61746144 is an unknown value
RDX=0x000002b400b98b08 is at entry_point+-842 in (nmethod*)0x000002b400b98b08
Compiled method (c1) 146224 6853 3 java.lang.CharacterData00::toLowerCase (3463 bytes)
total in heap [0x000002b400b98b08,0x000002b400b9c5f8] = 15088
relocation [0x000002b400b98be0,0x000002b400b98e28] = 584
main code [0x000002b400b98e40,0x000002b400b9c5a0] = 14176
stub code [0x000002b400b9c5a0,0x000002b400b9c5e8] = 72
metadata [0x000002b400b9c5e8,0x000002b400b9c5f8] = 16
immutable data [0x000002b415c77760,0x000002b415c777d0] = 112
dependencies [0x000002b415c77760,0x000002b415c77768] = 8
scopes pcs [0x000002b415c77768,0x000002b415c777a8] = 64
scopes data [0x000002b415c777a8,0x000002b415c777d0] = 40
RSP=0x000000c5ac5fe358 is pointing into the stack for thread: 0x000002b47b14ff10
RBP=0x0 is null
RSI=0x000002b41361b500 points into unknown readable memory: 0x0000000000000000 | 00 00 00 00 00 00 00 00
RDI=0x0000000000000002 is an unknown value
R8 =0x0 is null
R9 =0x0000000000000002 is an unknown value
R10=0x000002b46d7fa9b0 points into unknown readable memory: 0x000002b46e7992e0 | e0 92 79 6e b4 02 00 00
R11=0x000000c5ac5fe410 is pointing into the stack for thread: 0x000002b47b14ff10
R12=0x000002b47b151fb0 points into unknown readable memory: 0x000002b413e81da8 | a8 1d e8 13 b4 02 00 00
R13=0x0 is null
R14=0x000000c5ac5fe410 is pointing into the stack for thread: 0x000002b47b14ff10
R15=0x0000000000003af0 is an unknown value
-------------------------------------------
case 2:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007fffb16f233a, pid=8732, tid=36664
#
# JRE version: Java(TM) SE Runtime Environment (24.0+27) (build 24-ea+27-3418)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (24-ea+27-3418, mixed mode, tiered, compressed oops, compressed class ptrs, g1 gc, windows-amd64)
# Problematic frame:
# V [jvm.dll+0x70233a] nmethod::is_unloading+0xa
#
# Core dump will be written. Default location: C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\scratch\2\hs_err_pid8732.mdmp
#
# If you would like to submit a bug report, please visit:
# https://bugreport.java.com/bugreport/crash.jsp
#
--------------- S U M M A R Y ------------
Command Line: -Xmx768m -XX:MaxRAMPercentage=4.16667 -Dtest.boot.jdk=c:\ade\mesos\work_dir\jib-master\install\jdk\23\37\bundles\windows-x64\jdk-23_windows-x64_bin.zip\jdk-23 -Djava.io.tmpdir=c:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\tmp -XX:+CreateCoredumpOnCrash -ea -esa -Djava.library.path=c:\ade\mesos\work_dir\jib-master\install\jdk-24+27-3418\windows-x64.test\jdk\jtreg\native --patch-module=java.base=C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\patches\java.base -Djava.security.policy=file:/c:/sb/prod/1733172954/testoutput/test-support/jtreg_open_test_jdk_tier2_part2/jtreg.policy com.sun.javatest.regtest.agent.AgentServer -id 25 -logfile C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\jtData\agentServer.25.trace -allowSetSecurityManager -port 55604 -timeoutFactor 4.0
Host: AMD EPYC 7J13 64-Core Processor , 12 cores, 23G, Windows 11 , 64 bit Build 22621 (10.0.22621.3527)
Time: Mon Dec 2 21:07:22 2024 Etc elapsed time: 144.729009 seconds (0d 0h 2m 24s)
--------------- T H R E A D ---------------
Current thread (0x0000011a27e58850): JavaThread "C1 CompilerThread0" daemon [_thread_in_vm, id=36664, stack(0x00000008e9f00000,0x00000008ea000000) (1024K)]
Current CompileTask:
C1:144729 6223 3 java.lang.CharacterData00::toUpperCase (3484 bytes)
Stack: [0x00000008e9f00000,0x00000008ea000000], sp=0x00000008e9ffe790, free space=1017k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V [jvm.dll+0x70233a] nmethod::is_unloading+0xa (nmethod.cpp:2364)
V [jvm.dll+0x2bfbbe] DependencyContext::add_dependent_nmethod+0x4e (dependencyContext.cpp:95)
V [jvm.dll+0x3fa836] InstanceKlass::add_dependent_nmethod+0x26 (instanceKlass.cpp:2497)
V [jvm.dll+0x703a8b] nmethod::new_nmethod+0x39b (nmethod.cpp:1197)
V [jvm.dll+0x20fe91] ciEnv::register_method+0x421 (ciEnv.cpp:1074)
V [jvm.dll+0x1718d6] Compilation::compile_method+0x316 (c1_Compilation.cpp:488)
V [jvm.dll+0x170b6c] Compilation::Compilation+0x20c (c1_Compilation.cpp:609)
V [jvm.dll+0x17298d] Compiler::compile_method+0xdd (c1_Compiler.cpp:264)
V [jvm.dll+0x27dfdb] CompileBroker::invoke_compiler_on_method+0x7fb (compileBroker.cpp:2322)
V [jvm.dll+0x27c27a] CompileBroker::compiler_thread_loop+0x26a (compileBroker.cpp:1978)
V [jvm.dll+0x42edb6] JavaThread::run+0x116 (javaThread.cpp:757)
V [jvm.dll+0x87ce6b] Thread::call_run+0xcb (thread.cpp:242)
V [jvm.dll+0x72e535] thread_native_entry+0x95 (os_windows.cpp:545)
C [ucrtbase.dll+0x29333] (no source info available)
C [KERNEL32.DLL+0x1257d] (no source info available)
C [ntdll.dll+0x5aa48] (no source info available)
siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff
case 1:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007ff90c60a990, pid=34608, tid=22848
#
# JRE version: Java(TM) SE Runtime Environment (24.0+27) (build 24-ea+27-3417)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (24-ea+27-3417, mixed mode, tiered, compressed oops, compressed class ptrs, g1 gc, windows-amd64)
# Problematic frame:
# V [jvm.dll+0x6da990] Method::is_method_handle_intrinsic+0x0
#
# Core dump will be written. Default location: C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\scratch\5\hs_err_pid34608.mdmp
#
# If you would like to submit a bug report, please visit:
# https://bugreport.java.com/bugreport/crash.jsp
#
--------------- S U M M A R Y ------------
Command Line: -Xmx768m -XX:MaxRAMPercentage=4.16667 -Dtest.boot.jdk=c:\ade\mesos\work_dir\jib-master\install\jdk\23\37\bundles\windows-x64\jdk-23_windows-x64_bin.zip\jdk-23 -Djava.io.tmpdir=c:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\tmp -XX:+CreateCoredumpOnCrash -ea -esa -Djava.library.path=c:\ade\mesos\work_dir\jib-master\install\jdk-24+27-3417\windows-x64.test\jdk\jtreg\native --patch-module=java.base=C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\patches\java.base -Djava.security.policy=file:/c:/sb/prod/1733167089/testoutput/test-support/jtreg_open_test_jdk_tier2_part2/jtreg.policy com.sun.javatest.regtest.agent.AgentServer -id 24 -logfile C:\sb\prod\1733167089\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\jtData\agentServer.24.trace -allowSetSecurityManager -port 64468 -timeoutFactor 4.0
Host: AMD EPYC 7J13 64-Core Processor , 12 cores, 23G, Windows Server 2022 , 64 bit Build 20348 (10.0.20348.2760)
Time: Mon Dec 2 19:29:16 2024 Etc elapsed time: 146.106918 seconds (0d 0h 2m 26s)
--------------- T H R E A D ---------------
Current thread (0x000002b47b14ff10): JavaThread "C1 CompilerThread0" daemon [_thread_in_vm, id=22848, stack(0x000000c5ac500000,0x000000c5ac600000) (1024K)]
Current CompileTask:
C1:146107 6853 3 java.lang.CharacterData00::toLowerCase (3463 bytes)
Stack: [0x000000c5ac500000,0x000000c5ac600000], sp=0x000000c5ac5fe358, free space=1016k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V [jvm.dll+0x6da990] Method::is_method_handle_intrinsic+0x0 (method.cpp:1394)
siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff
Registers:
RAX=0x0000000000000000, RBX=0x000002b41361b500, RCX=0x636f6c5f61746144, RDX=0x000002b400b98b08
RSP=0x000000c5ac5fe358, RBP=0x0000000000000000, RSI=0x000002b41361b500, RDI=0x0000000000000002
R8 =0x0000000000000000, R9 =0x0000000000000002, R10=0x000002b46d7fa9b0, R11=0x000000c5ac5fe410
R12=0x000002b47b151fb0, R13=0x0000000000000000, R14=0x000000c5ac5fe410, R15=0x0000000000003af0
RIP=0x00007ff90c60a990, EFLAGS=0x0000000000010206
XMM[0]=0x0000000000000000 0x0000000000000000
XMM[1]=0x0000000000000000 0x00000000ffffffff
XMM[2]=0x310c480dff327c01 0x300e380578013105
XMM[3]=0x601b601b601b601b 0x601b601b601b601b
XMM[4]=0x601b601b601b601b 0x601b601b601b601b
XMM[5]=0x0000000000000000 0x000000200000371b
XMM[6]=0x0000000000000000 0x0000000000000000
XMM[7]=0x0000000000000000 0x0000000000000000
XMM[8]=0x0000000000000000 0x0000000000000000
XMM[9]=0x0000000000000000 0x0000000000000000
XMM[10]=0x0000000000000000 0x0000000000000000
XMM[11]=0x0000000000000000 0x0000000000000000
XMM[12]=0x0000000000000000 0x0000000000000000
XMM[13]=0x0000000000000000 0x0000000000000000
XMM[14]=0x0000000000000000 0x0000000000000000
XMM[15]=0x0000000000000000 0x0000000000000000
MXCSR=0x00001fa0
Register to memory mapping:
RAX=0x0 is null
RBX=0x000002b41361b500 points into unknown readable memory: 0x0000000000000000 | 00 00 00 00 00 00 00 00
RCX=0x636f6c5f61746144 is an unknown value
RDX=0x000002b400b98b08 is at entry_point+-842 in (nmethod*)0x000002b400b98b08
Compiled method (c1) 146224 6853 3 java.lang.CharacterData00::toLowerCase (3463 bytes)
total in heap [0x000002b400b98b08,0x000002b400b9c5f8] = 15088
relocation [0x000002b400b98be0,0x000002b400b98e28] = 584
main code [0x000002b400b98e40,0x000002b400b9c5a0] = 14176
stub code [0x000002b400b9c5a0,0x000002b400b9c5e8] = 72
metadata [0x000002b400b9c5e8,0x000002b400b9c5f8] = 16
immutable data [0x000002b415c77760,0x000002b415c777d0] = 112
dependencies [0x000002b415c77760,0x000002b415c77768] = 8
scopes pcs [0x000002b415c77768,0x000002b415c777a8] = 64
scopes data [0x000002b415c777a8,0x000002b415c777d0] = 40
RSP=0x000000c5ac5fe358 is pointing into the stack for thread: 0x000002b47b14ff10
RBP=0x0 is null
RSI=0x000002b41361b500 points into unknown readable memory: 0x0000000000000000 | 00 00 00 00 00 00 00 00
RDI=0x0000000000000002 is an unknown value
R8 =0x0 is null
R9 =0x0000000000000002 is an unknown value
R10=0x000002b46d7fa9b0 points into unknown readable memory: 0x000002b46e7992e0 | e0 92 79 6e b4 02 00 00
R11=0x000000c5ac5fe410 is pointing into the stack for thread: 0x000002b47b14ff10
R12=0x000002b47b151fb0 points into unknown readable memory: 0x000002b413e81da8 | a8 1d e8 13 b4 02 00 00
R13=0x0 is null
R14=0x000000c5ac5fe410 is pointing into the stack for thread: 0x000002b47b14ff10
R15=0x0000000000003af0 is an unknown value
-------------------------------------------
case 2:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# EXCEPTION_ACCESS_VIOLATION (0xc0000005) at pc=0x00007fffb16f233a, pid=8732, tid=36664
#
# JRE version: Java(TM) SE Runtime Environment (24.0+27) (build 24-ea+27-3418)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (24-ea+27-3418, mixed mode, tiered, compressed oops, compressed class ptrs, g1 gc, windows-amd64)
# Problematic frame:
# V [jvm.dll+0x70233a] nmethod::is_unloading+0xa
#
# Core dump will be written. Default location: C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\scratch\2\hs_err_pid8732.mdmp
#
# If you would like to submit a bug report, please visit:
# https://bugreport.java.com/bugreport/crash.jsp
#
--------------- S U M M A R Y ------------
Command Line: -Xmx768m -XX:MaxRAMPercentage=4.16667 -Dtest.boot.jdk=c:\ade\mesos\work_dir\jib-master\install\jdk\23\37\bundles\windows-x64\jdk-23_windows-x64_bin.zip\jdk-23 -Djava.io.tmpdir=c:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\tmp -XX:+CreateCoredumpOnCrash -ea -esa -Djava.library.path=c:\ade\mesos\work_dir\jib-master\install\jdk-24+27-3418\windows-x64.test\jdk\jtreg\native --patch-module=java.base=C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\patches\java.base -Djava.security.policy=file:/c:/sb/prod/1733172954/testoutput/test-support/jtreg_open_test_jdk_tier2_part2/jtreg.policy com.sun.javatest.regtest.agent.AgentServer -id 25 -logfile C:\sb\prod\1733172954\testoutput\test-support\jtreg_open_test_jdk_tier2_part2\jtData\agentServer.25.trace -allowSetSecurityManager -port 55604 -timeoutFactor 4.0
Host: AMD EPYC 7J13 64-Core Processor , 12 cores, 23G, Windows 11 , 64 bit Build 22621 (10.0.22621.3527)
Time: Mon Dec 2 21:07:22 2024 Etc elapsed time: 144.729009 seconds (0d 0h 2m 24s)
--------------- T H R E A D ---------------
Current thread (0x0000011a27e58850): JavaThread "C1 CompilerThread0" daemon [_thread_in_vm, id=36664, stack(0x00000008e9f00000,0x00000008ea000000) (1024K)]
Current CompileTask:
C1:144729 6223 3 java.lang.CharacterData00::toUpperCase (3484 bytes)
Stack: [0x00000008e9f00000,0x00000008ea000000], sp=0x00000008e9ffe790, free space=1017k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V [jvm.dll+0x70233a] nmethod::is_unloading+0xa (nmethod.cpp:2364)
V [jvm.dll+0x2bfbbe] DependencyContext::add_dependent_nmethod+0x4e (dependencyContext.cpp:95)
V [jvm.dll+0x3fa836] InstanceKlass::add_dependent_nmethod+0x26 (instanceKlass.cpp:2497)
V [jvm.dll+0x703a8b] nmethod::new_nmethod+0x39b (nmethod.cpp:1197)
V [jvm.dll+0x20fe91] ciEnv::register_method+0x421 (ciEnv.cpp:1074)
V [jvm.dll+0x1718d6] Compilation::compile_method+0x316 (c1_Compilation.cpp:488)
V [jvm.dll+0x170b6c] Compilation::Compilation+0x20c (c1_Compilation.cpp:609)
V [jvm.dll+0x17298d] Compiler::compile_method+0xdd (c1_Compiler.cpp:264)
V [jvm.dll+0x27dfdb] CompileBroker::invoke_compiler_on_method+0x7fb (compileBroker.cpp:2322)
V [jvm.dll+0x27c27a] CompileBroker::compiler_thread_loop+0x26a (compileBroker.cpp:1978)
V [jvm.dll+0x42edb6] JavaThread::run+0x116 (javaThread.cpp:757)
V [jvm.dll+0x87ce6b] Thread::call_run+0xcb (thread.cpp:242)
V [jvm.dll+0x72e535] thread_native_entry+0x95 (os_windows.cpp:545)
C [ucrtbase.dll+0x29333] (no source info available)
C [KERNEL32.DLL+0x1257d] (no source info available)
C [ntdll.dll+0x5aa48] (no source info available)
siginfo: EXCEPTION_ACCESS_VIOLATION (0xc0000005), reading address 0xffffffffffffffff
- duplicates
-
JDK-8345181 (ch) Windows asynchronous channels may return temporary direct buffers to the buffer cache twice (win)
- Resolved